
Ultimate access to all questions.
Your company is expanding its IT infrastructure to adopt a multi-cloud strategy, utilizing services from multiple cloud providers to host applications and store data. This strategy aims to enhance flexibility and avoid vendor lock-in. However, the security team is concerned about maintaining a consistent security posture across all cloud environments. As the Cybersecurity Architect, you are tasked with ensuring the security of the multi-cloud environment. Which of the following approaches BEST addresses the security concerns by specifying comprehensive security requirements, including secure communication, access control, and consistent security policies across all cloud providers, while also considering cost-effectiveness and scalability? (Choose one)
A
Implement strong authentication mechanisms and data encryption for each cloud provider individually, without establishing a unified security policy.
B
Develop and enforce a set of security requirements that include secure communication channels, strict access control measures, and uniform security policies across all cloud providers, tailored to the company's specific needs.
C
Focus solely on securing the network infrastructure and endpoints that access the multi-cloud environment, neglecting the need for consistent security policies across cloud providers.
D
Depend entirely on the security measures provided by each cloud provider, assuming they will adequately protect the company's data and applications without additional oversight.